Bob Da Builder - Ethical Hackers Be-aware
US Child Hackers Turn EVMs Into Jukeboxes, Change Candidate's
Name to 'Bob Da Builder'
At the annual ‘Def Con hacker convention', nearly 40 child
hackers were able to tamper with vote tallies on the mock versions of election
board websites.
US Child Hackers Turn EVMs Into Jukeboxes, Change Candidate's
Name to 'Bob Da Builder'
At the annual ‘Def Con hacker convention', nearly 40 child
hackers were able to tamper with vote tallies on the mock versions of election
board websites.
“One hacker was essentially able to turn a voting machine into a
jukebox, making it play music and display animations,” said the report.
“While such hacks are a cause of concern for election officials,
they are increasingly looking beyond the threats against traditional election
infrastructure like voting machines and voting databases and more to the threat
of disinformation,” it added.
At the event, nearly 40 child hackers were able to tamper with
vote tallies on the mock versions of election board websites, some even
changing candidates’ names to “Bob Da Builder” and “Richard Nixon's Head”.
“There's always been a concern about the integrity of our
elections and there's always been a concern about misinformation,
disinformation being disseminated around campaigns,” Alex Padilla, California’s
secretary of state, was quoted as saying.
This time, the “voting machine hacking village” at the
conference featured a new set of voting machines which will be used in the 2018
mid-term elections.
An intense debate is going on in India over the security of
EVMs. As many as 17 parties, including the Congress and the TMC, have
approached the Election Commission for restoring the paper ballot system in
view of their apprehensions over the integrity of the EVMs and the possibility
of their manipulation.
In today's digital era, one of the biggest threats comes from
cyber criminals. Hackers were not taken seriously until a few years back.
Recently, some big names in the Indian industry had to pay hefty sums of money
to hackers to keep confidential information from being disclosed to the
government. According to surveys conducted by cyber security firms in the
country, Indian firms lost more than $4 billion in 2013 alone because of
hackers.
With more and more companies entering the e-commerce ecosystem
and adopting new technologies like cloud computing, the threat from imminent security
breaches is clearly demanding the need for efficient information security
systems. The rising threat from cyber-attacks has exposed the severe shortage
of talent in this sector.
As per 2015 figures reported by Nasscom, India needed more than
77,000 white hat hackers as against only a mere 15,000 certified professional
ethical hackers in that year.
Ethical hacking is a way of objectively analysing an
organisation's data security structure. A new league of IT professionals called
white hat hackers or ethical hackers are emerging and gaining prominence. The
job of an ethical hacker is to purposefully penetrate security systems to fix
these weak points.
These professionals employ methods similar to that used by
malicious hackers, but they are required to be a step or two ahead of their
vicious counterparts. Ethical or white hat hackers may be employed by the
government, banks, or private firms to prevent cyber crime. They hack the
system with the permission from the client and present a maturity scorecard for
the network that highlights their overall risk.
Penetration testing or pen testing is a way of evaluating
Internet applications, networks and computer systems for the level of
vulnerability. This test helps in gauging the network and giving it a
real-world assessment.
·
Application
Testing: Done to uncover flaws in the system at the very core or
logical level
·
Remote
or war dialing: Used to test open-ended modem connections that remotely
connect to a network
·
Local
network testing: Deals with testing of services, protocols, system devices
and virtual private networks
·
Wireless
security: A method of measuring the level of security available in
the framework as a whole
·
System
hardening: Done to strengthen the host and mend weaknesses
·
Stolen
laptop: Done using the PC of an important employee, this test
examines for passwords and personal information stored in a dial-up software
·
Social
engineering: This type of hacking is very difficult to carry out as it
involves people, personalities and employees.
Cyber crimes are becoming more common and attackers more
sophisticated with rouge nation-states and terrorist organizations funding
criminals to breech security networks either to extort hefty ransoms or
compromise national security features.
Businesses are faced with the challenge of dealing with complex
security requirements that need to be updated as per changing hacking tactics,
handling hidden vulnerabilities and evolving technologies. Ethical hacking
firms with specially trained professionals come to the rescue of businesses
while ensuring effectiveness of service and confidentiality.
While many new businesses are better prepared in case of cyber
attacks, traditional businesses still lack the proactive understanding of the
need for ethical hacking. For example, in India, banks having faced the brunt
many-a-times are hiring professional help to secure their networks. Still the
investment infrastructure for banks against cyber crime is quite minuscule compared to that of banks in the US.
Hotels and other service wings of the industry seem to be
lagging behind. Recently, many hotels in the country were being attacked by a
malware called 'darkhotel' in an attempt to spy on or stalk corporate travelers
and gain access through the hotel's WIFI services.
With new worms, malware, ransom wares and viruses springing up
everyday, there is a need to create more awareness among businesses and how
ethical hacking can help them to safeguard their networks.
Ethical hacking as a career offers immense opportunities. A
fresh certified ethical hacker could attract a salary anywhere between INR 3.5
and 4 lakh per year. Experienced professionals in this field such as security
consultants, information security analysts, and ethical hacking experts can
command salaries in the range of INR 9 to INR 20 lakh.
Jetking Ethical hacking Career Graph |
Conclusion
The security of an enterprise should be analyzed for
effectiveness from time to time. Since businesses work in a structured yet
complex environment comprising of security, policies and changing
technologies, involving complex interactions and inter-operations, there is a
need to assess the system with a holistic approach. Ethical hacking solutions
are possibly the best way of examining such systems and fine-tuning any minor
gaps that may lead to compromise of the entire organization.
Comments
Post a Comment